메뉴 건너뛰기




Volumn , Issue , 2013, Pages 57-70

Process firewalls: Protecting processes during resource access

Author keywords

protection; resource access attacks

Indexed keywords

INTERNAL STATE; KERNEL MECHANISM; NAME RESOLUTION; NETWORK FIREWALLS; PROGRAM MODIFICATIONS; PROGRAM PERFORMANCE; PROTECTION; RESOURCE ACCESS;

EID: 84877716990     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2465351.2465358     Document Type: Conference Paper
Times cited : (17)

References (47)
  • 1
    • 84877694409 scopus 로고    scopus 로고
    • audit2allow. http://fedoraproject.org/wiki/SELinux/audit2allow.
    • Audit2allow
  • 2
    • 84877705226 scopus 로고    scopus 로고
    • Apache Performance Tuning. http://httpd.apache.org/docs/2.2/misc/perf- tuning.html#symlinks, 2012.
    • (2012) Apache Performance Tuning
  • 5
    • 0030092390 scopus 로고    scopus 로고
    • Checking for race conditions in file accesses
    • Spring
    • M. Bishop and M. Digler. Checking for race conditions in file accesses. Computer Systems, 9(2), Spring 1996.
    • (1996) Computer Systems , vol.9 , Issue.2
    • Bishop, M.1    Digler, M.2
  • 7
    • 84877714434 scopus 로고    scopus 로고
    • Exploiting Unix File-System Races via Algorithmic Complexity Attacks
    • X. Cai, Y. Gui, and R. Johnson. Exploiting Unix File-System Races via Algorithmic Complexity Attacks. In IEEE SSP, 2009.
    • (2009) IEEE SSP
    • Cai, X.1    Gui, Y.2    Johnson, R.3
  • 8
    • 85180543366 scopus 로고    scopus 로고
    • Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation
    • S. Chari, S. Halevi, and W. Venema. Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation. In NDSS '10, 2010.
    • (2010) NDSS '10
    • Chari, S.1    Halevi, S.2    Venema, W.3
  • 11
    • 85084160959 scopus 로고    scopus 로고
    • Raceguard: Kernel protection from temporary file race vulnerabilities
    • C. Cowan, S. Beattie, C. Wright, and G. Kroah-hartman. Raceguard: Kernel protection from temporary file race vulnerabilities. In USENIX SSYM, 2001.
    • (2001) USENIX SSYM
    • Cowan, C.1    Beattie, S.2    Wright, C.3    Kroah-hartman, G.4
  • 16
    • 85084160542 scopus 로고    scopus 로고
    • A flexible containment mechanism for executing untrusted code
    • David S. Peterson and Matt Bishop and Raju P. A flexible containment mechanism for executing untrusted code. In USENIX Security, 2002.
    • (2002) USENIX Security
    • Peterson, D.S.1    Bishop, M.2    Raju, P.3
  • 17
    • 33845455287 scopus 로고    scopus 로고
    • Fixing races for fun and profit
    • D. Dean and A. Hu. Fixing races for fun and profit. In USENIX Security, 2004.
    • (2004) USENIX Security
    • Dean, D.1    Hu, A.2
  • 20
    • 85180527583 scopus 로고    scopus 로고
    • Traps and pitfalls: Practical problems in in system call interposition based security tools
    • T. Garfinkel. Traps and pitfalls: Practical problems in in system call interposition based security tools. In NDSS, 2003.
    • (2003) NDSS
    • Garfinkel, T.1
  • 21
    • 85180406262 scopus 로고    scopus 로고
    • Ostia: A delegating architecture for secure system call interposition
    • T. Garfinkel, B. Pfaff, and M. Rosenblum. Ostia: A delegating architecture for secure system call interposition. In NDSS, 2004.
    • (2004) NDSS
    • Garfinkel, T.1    Pfaff, B.2    Rosenblum, M.3
  • 24
    • 85077749236 scopus 로고    scopus 로고
    • Analyzing Integrity Protection in the SELinux Example Policy
    • T. Jaeger, R. Sailer, and X. Zhang. Analyzing Integrity Protection in the SELinux Example Policy. In USENIX Security, 2003.
    • (2003) USENIX Security
    • Jaeger, T.1    Sailer, R.2    Zhang, X.3
  • 25
    • 3142518085 scopus 로고    scopus 로고
    • Consistency analysis of authorization hook placement in the Linux security modules framework
    • T. Jaeger, A. Edwards, and X. Zhang. Consistency analysis of authorization hook placement in the Linux security modules framework. ACM Trans. Inf. Syst. Secur., 2004.
    • (2004) ACM Trans. Inf. Syst. Secur.
    • Jaeger, T.1    Edwards, A.2    Zhang, X.3
  • 28
    • 0016336411 scopus 로고
    • Operating system integrity in OS/VS2
    • W. S. McPhee. Operating system integrity in OS/VS2. IBM Syst. J., 1974.
    • (1974) IBM Syst. J.
    • McPhee, W.S.1
  • 29
    • 84877710750 scopus 로고    scopus 로고
    • Enforcing user-space privilege separation with declarative architectures
    • B. Niu and G. Tan. Enforcing user-space privilege separation with declarative architectures. In ACM STC, 2012.
    • (2012) ACM STC
    • Niu, B.1    Tan, G.2
  • 31
    • 84877720432 scopus 로고    scopus 로고
    • NSA. SELinux, 2012. http://www.nsa.gov/selinux.
    • (2012) SELinux
  • 33
    • 84877697492 scopus 로고    scopus 로고
    • Safe loading - A foundation for secure execution of untrusted programs
    • M. Payer, T. Hartmann, and T. R. Gross. Safe loading - a foundation for secure execution of untrusted programs. In IEEE S&P, 2012.
    • (2012) IEEE S&P
    • Payer, M.1    Hartmann, T.2    Gross, T.R.3
  • 34
    • 84878346861 scopus 로고    scopus 로고
    • Improving host security with system call policies
    • N. Provos. Improving host security with system call policies. In USENIX Security, 2003.
    • (2003) USENIX Security
    • Provos, N.1
  • 37
    • 20444442399 scopus 로고    scopus 로고
    • A fast automaton-based method for detecting anomalous program behaviors
    • R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni. A fast automaton-based method for detecting anomalous program behaviors. In IEEE SS&P '01, 2001.
    • (2001) IEEE SS&P '01
    • Sekar, R.1    Bendre, M.2    Dhurjati, D.3    Bollineni, P.4
  • 38
    • 17644422613 scopus 로고    scopus 로고
    • Model-carrying code: A practical approach for safe execution of untrusted applications
    • R. Sekar, V. Venkatakrishnan, S. Basu, S. Bhatkar, and D. C. DuVarney. Model-carrying code: a practical approach for safe execution of untrusted applications. In SOSP '03, 2003.
    • (2003) SOSP '03
    • Sekar, R.1    Venkatakrishnan, V.2    Basu, S.3    Bhatkar, S.4    DuVarney, D.C.5
  • 39
    • 78449299493 scopus 로고    scopus 로고
    • Portably solving file TOCTTOU races with hardness amplification
    • D. Tsafrir, T. Hertz, D. Wagner, and D. Da Silva. Portably solving file TOCTTOU races with hardness amplification. In USENIX FAST, 2008.
    • (2008) USENIX FAST
    • Tsafrir, D.1    Hertz, T.2    Wagner, D.3    Da Silva, D.4
  • 40
    • 84871971635 scopus 로고    scopus 로고
    • Integrity walls: Finding attack surfaces from mandatory access control policies
    • H. Vijayakumar, G. Jakka, S. Rueda, J. Schiffman, and T. Jaeger. Integrity walls: Finding attack surfaces from mandatory access control policies. In ASIACCS, 2012.
    • (2012) ASIACCS
    • Vijayakumar, H.1    Jakka, G.2    Rueda, S.3    Schiffman, J.4    Jaeger, T.5
  • 44
    • 78449281125 scopus 로고    scopus 로고
    • Modeling and preventing TOCTTOU vulnerabilities in Unix-style file systems
    • J. Wei and C. Pu. Modeling and preventing TOCTTOU vulnerabilities in Unix-style file systems. Computers & Security, 2010.
    • (2010) Computers & Security
    • Wei, J.1    Pu, C.2
  • 45
    • 85084164351 scopus 로고    scopus 로고
    • Linux security modules: General security support for the Linux kernel
    • C. Wright, C. Cowan, and J. Morris. Linux security modules: General security support for the Linux kernel. In USENIX Security, 2002.
    • (2002) USENIX Security
    • Wright, C.1    Cowan, C.2    Morris, J.3
  • 47
    • 85084161756 scopus 로고    scopus 로고
    • Using CQUAL for static analysis of authorization hook placement
    • X. Zhang, A. Edwards, and T. Jaeger. Using CQUAL for static analysis of authorization hook placement. In USENIX Security, 2002.
    • (2002) USENIX Security
    • Zhang, X.1    Edwards, A.2    Jaeger, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.